Analysis
-
max time kernel
113s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en -
submitted
20-09-2021 12:45
Static task
static1
Behavioral task
behavioral1
Sample
2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe
Resource
win7-en-20210916
Behavioral task
behavioral2
Sample
2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe
Resource
win10-en
General
-
Target
2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe
-
Size
78KB
-
MD5
6e5986761cea340dce2efd4cf4f3790c
-
SHA1
4a8ca4b5c04112a753e9ff5989b80f0b12e13654
-
SHA256
2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd
-
SHA512
8df4406a8807978df8690cb578cd00f8d22c2ad5ff78b8d87806484adcde2eaa2901f1da100c31f1538da0503043c78cb3856d0592af2f094901d864956b83af
Malware Config
Extracted
C:\fViGXl6GW.README.txt
blackmatter
http://supp24maprinktc7uizgfyqhisx7lkszb6ogh6lwdzpac23w3mh4tvyd.onion/GBSLNRB4NL0OG6FX
Signatures
-
BlackMatter Ransomware
BlackMatter ransomware group claims to be Darkside and REvil succesor.
-
Modifies extensions of user files 15 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File opened for modification C:\Users\Admin\Pictures\WatchInstall.crw.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\SubmitWrite.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\SuspendRename.crw => C:\Users\Admin\Pictures\SuspendRename.crw.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\SuspendRename.crw.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\WatchInstall.crw => C:\Users\Admin\Pictures\WatchInstall.crw.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\WaitSuspend.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\BackupDismount.png => C:\Users\Admin\Pictures\BackupDismount.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\BackupDismount.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\UnprotectEdit.tif => C:\Users\Admin\Pictures\UnprotectEdit.tif.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\WaitSuspend.png => C:\Users\Admin\Pictures\WaitSuspend.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\HideExport.tiff 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\HideExport.tiff.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\SubmitWrite.png => C:\Users\Admin\Pictures\SubmitWrite.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File renamed C:\Users\Admin\Pictures\HideExport.tiff => C:\Users\Admin\Pictures\HideExport.tiff.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Users\Admin\Pictures\UnprotectEdit.tif.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\ROMAN.TXT 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\illustrations.png.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1702.301.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-30.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Car\RTL\WideTile.scale-200.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-20_contrast-black.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-masterfs_zh_CN.jar.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\sv-se\ui-strings.js.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\3838_48x48x32.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\da\msipc.dll.mui 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\LICENSE 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\pt-br\ui-strings.js 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\en\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_neutral_resources.scale-150_8wekyb3d8bbwe\Assets\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000042\assets\assets\images\MSFT.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\svgCheckboxSelected.svg.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxA-Google.scale-300.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Messaging_3.26.24002.0_neutral_split.scale-150_8wekyb3d8bbwe\Assets\starttile.dualsim1.smile.small.scale-150.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-settings_zh_CN.jar.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_SubTest3-ul-oob.xrm-ms 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_Subscription2-pl.xrm-ms.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\dark\e4-dark_preferencestyle.css.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\nl-nl\ui-strings.js 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\animations\OneNoteAudio_RecordingPlayback.gif 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.3DBuilder_13.0.10349.0_x64__8wekyb3d8bbwe\Assets\EmbossBitmaps\Chevron.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-ul-phn.xrm-ms.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Collections\contrast-white\WideTile.scale-100_contrast-white.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\Content\SaturationGradient.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-pl.xrm-ms 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\AddressBook2x.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\Resources\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themeless\close.svg.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.officemuiset.msi.16.en-us.xml.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp2-pl.xrm-ms 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\VideoLAN\VLC\locale\an\LC_MESSAGES\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\VideoLAN\VLC\lua\meta\art\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL107.XML.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubSmallTile.scale-100.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_16.511.8780.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-16_altform-fullcolor.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\Word 2010 look.dotx.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\css\main-selector.css.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ul-oob.xrm-ms 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\fonts\LucidaTypewriterBold.ttf 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\new_icons.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.16112.11621.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-40_altform-unplated.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\_Resources\9.rsrc 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-lib-uihandler.xml.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sa.xml 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\PackageManifests\AuthoredExtensions.16.xml.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\Awards\freecell\Get_Out_Of_Jail_Free_.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\GostName.XSL 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Gothic-Palatino Linotype.xml 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\7-Zip\Lang\an.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1.10531.0_x64__8wekyb3d8bbwe\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_OEM_Perp-ul-phn.xrm-ms.fViGXl6GW 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.18.56.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\fViGXl6GW.README.txt 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PIXEL\PIXEL.INF 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11701.1001.87.0_x64__8wekyb3d8bbwe\WinStore\Resources\Assets\RT_Icons_Spilt_16.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_4.5.6.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-48_contrast-black.png 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Control Panel\International 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeBackupPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeDebugPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: 36 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeImpersonatePrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeIncBasePriorityPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeIncreaseQuotaPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: 33 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeManageVolumePrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeProfSingleProcessPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeRestorePrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeSecurityPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeSystemProfilePrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeTakeOwnershipPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeShutdownPrivilege 3556 2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe Token: SeBackupPrivilege 3920 vssvc.exe Token: SeRestorePrivilege 3920 vssvc.exe Token: SeAuditPrivilege 3920 vssvc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\2cdb5edf3039863c30818ca34d9240cb0068ad33128895500721bcdca70c78fd.bin.sample.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3920